Attackers are after your data, and ultimately, they will reach it as no perimeter solution is perfect. Therefore, you also need to implement protection at the data level - where it counts the most:
Why perimeter ransomware protection methods aren’t enough
The fundamentals of a data-centric approach to ransomware protection
Roles and responsibilities in data protection
NetApp’s full set of capabilities to protect your data from ransomware